To improve the service, use your own and third-party cookies. If you continue browsing, we understand that you accept its use according to our cookies policy.
Areas of interest
Data processing
Reliable and upgradeable systems
Privacy
Attack and defense against threats
Critical infrastructures
Identity management
Evaluation of systems and cyber risk
Lines of investigation
Cryptographic authentication
Search for the origin of the threat
Secure computing
Secure multipart computing
Verifiable computing
Access control and authentication
Access control based on behaviour
Post-quantum encryption
Development of simulation environments for experimentation with trusted systems
Development of integrated security environments
Development of threat detection tools
Anomaly detection
Detection of malicious software
Detection and removal of malware
Design of security requirements
Information filtering
Reliable global-level identity generation
Attacker identification and location
Secure development languages and frameworks
Improvement of security protocols and standards
Secure validation methods
System modelling and system attacks
Computational trust models
Formal interoperable models
Secure data processing
Encryption protocols for preserving privacy
Authentication protocols
Security / privacy through design
Threat and attack simulation
Simulation of dangerous environments